Articles with "eavesdropping jamming" as a keyword



Enhancing Security With Hybrid Active- Passive RIS: A DRL Approach Against Eavesdropping and Jamming

Sign Up to like & get
recommendations!
Published in 2025 at "IEEE Access"

DOI: 10.1109/access.2024.3520151

Abstract: The security of wireless communications is increasingly threatened by eavesdropping and jamming attacks. This paper proposes a novel framework for enhancing secure transmission using hybrid active-passive Reconfigurable Intelligent Surfaces (RIS). By combining active and passive… read more here.

Keywords: eavesdropping jamming; drl approach; hybrid active; security ... See more keywords

Proactive Eavesdropping With Jamming Power Allocation in Training-Based Suspicious Communications

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Signal Processing Letters"

DOI: 10.1109/lsp.2022.3150244

Abstract: This letter studies proactive eavesdropping with one legitimate monitor (E) in the classical single-hop suspicious communication. Specifically, unlike all previous works that ignored the suspicious channel training phase and just considered the jamming power optimization… read more here.

Keywords: power allocation; proactive eavesdropping; eavesdropping jamming; power ... See more keywords